Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 11:04
Static task
static1
Behavioral task
behavioral1
Sample
787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exe
Resource
win10v2004-20230220-en
General
-
Target
787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exe
-
Size
728KB
-
MD5
032f33f8d2fc873a2768470f3baef37e
-
SHA1
a182237ba140d29fe9809f98d92529addbce6eeb
-
SHA256
787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89
-
SHA512
bb1c653fae1c46b76850bd6e056c057771c8fc74702483bb2f438808e17b4e895f5558ddfa84157302024216f65ec007bdeeb839787071fb6049bb8c6d5037fa
-
SSDEEP
12288:gMryy90mCQH31/9WKsyanitRKNBqjb7o4XgtxqOGW5lUqK51kS26z4K8vgdh7XDN:CyPB9+1izKascgt9Gr4K8vsVUGL
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a9222261.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9222261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9222261.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a9222261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9222261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9222261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9222261.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v5068539.exev8645782.exev6463495.exea9222261.exeb1054304.exec1254105.exepid process 3608 v5068539.exe 4388 v8645782.exe 4160 v6463495.exe 2020 a9222261.exe 416 b1054304.exe 1876 c1254105.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a9222261.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9222261.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v5068539.exev8645782.exev6463495.exe787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5068539.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5068539.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8645782.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8645782.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6463495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6463495.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b1054304.exedescription pid process target process PID 416 set thread context of 2712 416 b1054304.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
a9222261.exeAppLaunch.exec1254105.exepid process 2020 a9222261.exe 2020 a9222261.exe 2712 AppLaunch.exe 2712 AppLaunch.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe 1876 c1254105.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a9222261.exeAppLaunch.exec1254105.exedescription pid process Token: SeDebugPrivilege 2020 a9222261.exe Token: SeDebugPrivilege 2712 AppLaunch.exe Token: SeDebugPrivilege 1876 c1254105.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exev5068539.exev8645782.exev6463495.exeb1054304.exedescription pid process target process PID 3996 wrote to memory of 3608 3996 787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exe v5068539.exe PID 3996 wrote to memory of 3608 3996 787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exe v5068539.exe PID 3996 wrote to memory of 3608 3996 787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exe v5068539.exe PID 3608 wrote to memory of 4388 3608 v5068539.exe v8645782.exe PID 3608 wrote to memory of 4388 3608 v5068539.exe v8645782.exe PID 3608 wrote to memory of 4388 3608 v5068539.exe v8645782.exe PID 4388 wrote to memory of 4160 4388 v8645782.exe v6463495.exe PID 4388 wrote to memory of 4160 4388 v8645782.exe v6463495.exe PID 4388 wrote to memory of 4160 4388 v8645782.exe v6463495.exe PID 4160 wrote to memory of 2020 4160 v6463495.exe a9222261.exe PID 4160 wrote to memory of 2020 4160 v6463495.exe a9222261.exe PID 4160 wrote to memory of 416 4160 v6463495.exe b1054304.exe PID 4160 wrote to memory of 416 4160 v6463495.exe b1054304.exe PID 4160 wrote to memory of 416 4160 v6463495.exe b1054304.exe PID 416 wrote to memory of 2712 416 b1054304.exe AppLaunch.exe PID 416 wrote to memory of 2712 416 b1054304.exe AppLaunch.exe PID 416 wrote to memory of 2712 416 b1054304.exe AppLaunch.exe PID 416 wrote to memory of 2712 416 b1054304.exe AppLaunch.exe PID 416 wrote to memory of 2712 416 b1054304.exe AppLaunch.exe PID 4388 wrote to memory of 1876 4388 v8645782.exe c1254105.exe PID 4388 wrote to memory of 1876 4388 v8645782.exe c1254105.exe PID 4388 wrote to memory of 1876 4388 v8645782.exe c1254105.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exe"C:\Users\Admin\AppData\Local\Temp\787dad1bbeb81bbdd632321c158541f842447e7c9b3acd0aba65c80e4ded9a89.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5068539.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5068539.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8645782.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8645782.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6463495.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6463495.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9222261.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9222261.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1054304.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1054304.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1254105.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1254105.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526KB
MD5ad7af1ae553baec57ce41810f504a283
SHA13640da4da0e01ad2251a79641024ca0833810af8
SHA25610a3a1a4a5f060bc0282b9294e5ae6e102c43ee434f69b048ba8e53dfe4ff735
SHA512cb9aad75d0d1c26675c5a8676d4ab1c25ae781b063fe453cc49a895acd5ea91cb06f3fc9f8adae890dbef8e31c389d00398e188566530ffcb45b0464dc2b2ba4
-
Filesize
526KB
MD5ad7af1ae553baec57ce41810f504a283
SHA13640da4da0e01ad2251a79641024ca0833810af8
SHA25610a3a1a4a5f060bc0282b9294e5ae6e102c43ee434f69b048ba8e53dfe4ff735
SHA512cb9aad75d0d1c26675c5a8676d4ab1c25ae781b063fe453cc49a895acd5ea91cb06f3fc9f8adae890dbef8e31c389d00398e188566530ffcb45b0464dc2b2ba4
-
Filesize
354KB
MD5c077e34f38b58f69bc19669fc114b256
SHA1a7caa675a2364a24baf33322af8d9f2d2b137b9c
SHA2568b840686c1e87c4a64f85cc5893557b3c84786cab549f9e56d108c091e2b6066
SHA5120e218f9fdd45be0609e4e6d544504add7e53fc4b8b3c17276e096704b68399aded9cc376fefad8e0cffceea5817086f522f75700aebfc96150a255651bde4b6e
-
Filesize
354KB
MD5c077e34f38b58f69bc19669fc114b256
SHA1a7caa675a2364a24baf33322af8d9f2d2b137b9c
SHA2568b840686c1e87c4a64f85cc5893557b3c84786cab549f9e56d108c091e2b6066
SHA5120e218f9fdd45be0609e4e6d544504add7e53fc4b8b3c17276e096704b68399aded9cc376fefad8e0cffceea5817086f522f75700aebfc96150a255651bde4b6e
-
Filesize
172KB
MD56d793567c8f1c4cf39070613811dd1f2
SHA1d1d34eba004684068418d01a639bd7368f5d75bb
SHA256ce2bb8ba32e2a1ceb935ddeccbeb03557d4ae82ee2d1dc72dc78225772a8745a
SHA5121a8d8cbdb7bbbb2e573c22464577f466352458bf4343e3697168ecb6852f956fb4b34f3089e0192007860d312ac6ef80e7db69e83c6860a805394d3ef0837b4e
-
Filesize
172KB
MD56d793567c8f1c4cf39070613811dd1f2
SHA1d1d34eba004684068418d01a639bd7368f5d75bb
SHA256ce2bb8ba32e2a1ceb935ddeccbeb03557d4ae82ee2d1dc72dc78225772a8745a
SHA5121a8d8cbdb7bbbb2e573c22464577f466352458bf4343e3697168ecb6852f956fb4b34f3089e0192007860d312ac6ef80e7db69e83c6860a805394d3ef0837b4e
-
Filesize
199KB
MD50d7386ee35a9f58e1442d7a313496ba3
SHA1ff470c6d9d2a34940ad5c648a7b7248996237428
SHA256ac2769af25884e7d3690e8b6dc1cb57249493f542f94d20784a8bb51ab6d5634
SHA5123603707ad804305cd570158e9b458e75b01393ad75b99f8f549ba4e5142b4ffd5a89e9da4ea49df3b52ea49cdee5d0204b8f135dc28d0e0240966ef2ddf6a373
-
Filesize
199KB
MD50d7386ee35a9f58e1442d7a313496ba3
SHA1ff470c6d9d2a34940ad5c648a7b7248996237428
SHA256ac2769af25884e7d3690e8b6dc1cb57249493f542f94d20784a8bb51ab6d5634
SHA5123603707ad804305cd570158e9b458e75b01393ad75b99f8f549ba4e5142b4ffd5a89e9da4ea49df3b52ea49cdee5d0204b8f135dc28d0e0240966ef2ddf6a373
-
Filesize
12KB
MD5630d203bd36bc62c43ea5cf97efa525f
SHA1010589038d38ad35381cc6dbef7aff45fba641bd
SHA256372aa8e3a18ee6e0460892453e8019ec83e79de20e8bebc1dff0d4487d806e82
SHA5125592c25901db361369f0ad3fa09a631123fc29fc041c5b88754241073975ffaf82e5f5af0c49b16b203261b8e63a59cb22c93fb58179e7ec9d43ab845a19437c
-
Filesize
12KB
MD5630d203bd36bc62c43ea5cf97efa525f
SHA1010589038d38ad35381cc6dbef7aff45fba641bd
SHA256372aa8e3a18ee6e0460892453e8019ec83e79de20e8bebc1dff0d4487d806e82
SHA5125592c25901db361369f0ad3fa09a631123fc29fc041c5b88754241073975ffaf82e5f5af0c49b16b203261b8e63a59cb22c93fb58179e7ec9d43ab845a19437c
-
Filesize
106KB
MD5cf3c9eacfdb4485cc307500ec1214c59
SHA1c92b0f0a1d42710410a4db98416be7d1b97e1136
SHA2564c1d078bdeae620dc47e35255eab38302c27792e0ed169ec47000319ed200dd6
SHA512ba68a69a8b24040a26aaec62cea5c77df9f69567ea3c552e46996a144445624d3771dc02a96d185beee7b37d15390ea3d7df799cbd78531e7bf63e264c465815
-
Filesize
106KB
MD5cf3c9eacfdb4485cc307500ec1214c59
SHA1c92b0f0a1d42710410a4db98416be7d1b97e1136
SHA2564c1d078bdeae620dc47e35255eab38302c27792e0ed169ec47000319ed200dd6
SHA512ba68a69a8b24040a26aaec62cea5c77df9f69567ea3c552e46996a144445624d3771dc02a96d185beee7b37d15390ea3d7df799cbd78531e7bf63e264c465815